Cryptome Hacked; All Files Deleted 170
eldavojohn writes "Over the weekend, the whistle blowing site Cryptome was hacked and vandalized, resulting in all 54,000 files being deleted and two days worth of submissions lost. Cryptome reported that its EarthLink e-mail account was compromised in ways unknown, and once the attacker was inside there, they were able to request a new password from the administration console for Cryptome at their hosting provider, Network Solutions. Once the attacker had that password, they deleted the ~7 GB of data that Cryptome hosted in around 54,000 files. Cryptome was able to eventually restore the site, as they keep backups ready for cases like this and stated that they 'do not trust our ISP, email provider and officials to tell the truth or protect us.'"
Editing! (Score:4, Insightful)
Holy cow, please edit the submissions before posting them.
*sigh* I'll get modded down for having the nerve to ask for a baseline of professionalism, won't I?
Re:Editing! (Score:5, Funny)
Re:Editing! (Score:4, Insightful)
Professionalism? How about a baseline of a spelling, grammar and general writing skills?
/ Kill me with moderation, William "B.J." Blazkowicz, I am in a Grammar Nazi mood today.
Re: (Score:2)
Over the weekend, the whistle blowing site Cryptome was hacked and vandalized this weekend
-1, redundant. Brought to you by the slashdot department of redundancy department.
Re: (Score:3, Funny)
Re:Editing! (Score:5, Funny)
I know I'll get modded down for saying this, but parent is right.
...what? (Score:4, Interesting)
The real WTF here is that
A) Cryptome is running on Network Solutions
B) The email associated with the account is on *earthlink* ???
C) None of these things have been shut down.
Seriously, doesn't cryptome host some pretty shady stuff? On the same level as wikileaks, isn't it? What the hell is going on here?
Re:...what? (Score:5, Interesting)
I don't believe their Earthlink account was *hacked*.
http://www.skeptictank.org/hs/elcoslnk.htm [slashdot.org]">Earthlink is connected to the Scentology cult, which are known for hating free spech on the internet. If Cryptome had hosted anything remotely connected with Scientology, they would not hesitate to use that email account to hurt Cryptome.
Re:...what? (Score:5, Funny)
Man, that really stinks.
Re: (Score:2)
Nah - you'd be able to smell *their* vile stench when you came on board!
Pug
Re: (Score:2)
Come on, give the guy a break. He is only protecting himself against potential lawsuits.
Re: (Score:3, Insightful)
Re: (Score:2)
Scientology would never try to compromise anything confidential!
Well, except for that one Operation Snow White thing: http://en.wikipedia.org/wiki/Operation_snow_white [wikipedia.org]
Re: (Score:2)
The owner is an old crusty guy that lives in NYC - not that there is anything wrong with that, but he's an old school guy and, well, what you see is what you get.
Re: (Score:2)
Meaning, he's been getting away with not doing hotter backups this long, and isn't likely to change.
Seems like the government at work. (Score:2)
And if it's the government they wouldn't have to actually hack the email account password, they'd already know it. They'd simply log in and do the work and nobody would suspect them. It's a very convenient time, considering what was being posted on Cryptome, it was very explosive stuff involving Julian Assange, Wikileaks, etc.
Hmmm. (Score:2, Redundant)
stated that they 'do not trust our ISP, email provider and officials to tell the truth or protect us.'"
Just like I wouldn't trust you not to pull something like this for publicity's sake, but I guess in both cases, no one will ever know, so its moot.
Re:Hmmm. (Score:5, Funny)
> no one will ever know, so its moot.
Oh Christ don't bring 4chan into this!
Re: (Score:3)
I'd expect that if it were a publicity stunt, they might mention a possible motive. As it is, I'd probably guess it's something like a bored teenager who was too lazy to scratch some vulgarity on a bathroom wall. Had they made even a tenuous conspiracy theory I might be more interested. Interested enough to click on over to cryptome anyway.
Not to say that obviously this isn't a publicity stunt because it could have been done more effectively.
Earthlink? Network Solutions? (Score:4, Insightful)
Re:Earthlink? Network Solutions? (Score:5, Insightful)
and you're an idiot if you post anything there expecting to be anonymous.
Why? If I really wanted to post something anonymously, I would set up a network of proxy SSH severs paid for with prepaid debit cards (purchased using cash), change the wireless MAC on a throwaway secondhand laptop (purchased using cash off Craigslist), walk down to the local Starbucks, access my proxy setup through Tor, and then be reasonably confident that I would be able to do anything anonymously. Of course, I would only post plain text files.
So I don't really understand why you would be an idiot for expecting anonymity if you went to the pains of taking care of it.
Re: (Score:2)
Oh it's much easier than hiding behind 7 Boxxys.
Have an account on your laptop that you never use anything. Have it clean your webserver - and flash - cookies on logout.
cybercafe, post, blah blah.
Re: (Score:2)
Re: (Score:2)
Don't forget to wipe the security cameras.
You think they can't just find out when the pre-paid debit card was activated/used and look at the store videos?
It's very hard to do a taxable transaction these days without it ending up on video somewhere.
Re: (Score:2)
Don't forget to wipe the security cameras.
You think they can't just find out when the pre-paid debit card was activated/used and look at the store videos?
It's very hard to do a taxable transaction these days without it ending up on video somewhere.
Wear a Burqa; unless of course you're in France.
Re: (Score:2)
Video backup systems don't store the feed forever. Waiting a month to use the activated cards should be enough time.
Re: (Score:2)
Or if you really wanted to be paranoid just use a Linux that can run in RAM like Puppy
Even more hardcore, pull the hard drive and use a locked-down & encrypted/proxied OpenBSD live CD along the lines of AnonymOS plus the other measures mentioned. Then torch and send to a watery grave both the laptop and the live CD in different locations. Be sure to do this all underground because of satellites/drones, avoid store/bank security cameras, don't carry a cellphone, and don't let the tinfoil hat get too tigh
Re: (Score:2)
The problem is that if you post something that's supposed to be a secret, all those in know have to ask is "who knew and had the opportunity?", and take it from there.
They don't need to trace you back, they can get you from the other end, and then the CCD showing you walking in to Starbucks with a laptop under your hand combined with your ATM withdrawals is enough to put the focus on you instead of the others.
The only way to truly be anonymous is to keep it all in your head. Personally, I opt for the bette
Re: (Score:2)
Re: (Score:2)
They would instantly have your MAC and then track down the person who you bought the laptop from who would describe you, and possibly still have some of the cash you gave them with your fingerprints. Tor is useless if they can watch both ends, and they can and are. U.S. Mail is far more secure than anything you can do on the internet...
Backups for the win! (Score:2)
Seriously, back up your data. Multiple copies in multiple locations.
These guys were smart enough to keep backups (hopefully up-to-date backups) so this is nothing more than an annoyance to them, but if they hadn't it would be what we refer to around here as a resume-generating-event.
If it's worth keeping, its worth backing up.
Re:Backups for the win! (Score:5, Insightful)
But they weren't smart enough to mirror submissions to other servers and so two days of submissions were lost. Those two days could easily have been the target. If so, then mission accomplished.
Re:Backups for the win! (Score:4, Insightful)
Re:Backups for the win! (Score:5, Interesting)
Re: (Score:2)
Re: (Score:2)
well if scientology was involved the suicide was probably carried out with a shotgun to the back of the head, twice for good measure
Why would it be scientology? While I do not put it past them, since when did they have this sort of capability?
Re: (Score:2)
Since scientology (and, indeed, any large organization) probably has at least 1 person in its member pool who is crazy enough to shoot someone if they were convinced to...
I'm sure they're more than capable, as, again, is pretty much any large organization, but somehow I doubt even with all the paranoia around scientology that they're really killing people.
Re: (Score:2)
Laundry day (Score:4, Funny)
Why am I suddenly worried for the state of your laundry?
Cheers,
Re: (Score:2)
dammit where are my mod points! +1 funny
Re: (Score:2)
Seriously, back up your data. Multiple copies in multiple locations.
These guys were smart enough to keep backups (hopefully up-to-date backups) so this is nothing more than an annoyance to them, but if they hadn't it would be what we refer to around here as a resume-generating-event.
If it's worth keeping, its worth backing up.
Yeah, seriously. I work at a small (10 people) company, and I still have us set up with an Ubuntu server with nightly incremental backups to a second machine, as well as weekly full backups to the second machine and the server itself that go back 6 weeks. Every month I do the same thing, and keep those for 6 months. I also backup manually to an external USB drive once every month or so.
It took a bit of time out of my schedule to setup, but now it just goes, and damn if having backups isn't amazing. Our issu
Re: (Score:2)
Apparently they were not smart enough to host using their own hardware with no administrative access for anyone else.
Apparently you don't quite understand how the majority of small sites on the internet work.
the above would make a LOT more sense if it had said:
Apparently they didn't have enough money to host using their own hardware with no administrative access for anyone else.
A little paranoid. (Score:2)
Your high profile site got hacked and you blame everyone else.
Well you did pick your ISP and email provider. Honestly folks might I suggest RackSpace? We use them and they have been great if a little expensive but you get what you pay for.
Any site can be shut down. (Score:2)
If the government wants to shut down a site they can probably do it. They'll just have one of their assets at earthlink or whereever handle it.
Re: (Score:2)
Actually I have no problem with Cryptome at all.
I have a problem with blaming people and cooking up conspiracy theories.
Cryptome was blaming the host and says they can not trust them. Why did they pick them?
They are blaming their email provider. Well you picked those as well.
When you run a site the ultimate responsibility for security is you. You choose your hosting.
Maybe they should pick a better host and move on.
Re: (Score:3, Informative)
Re: (Score:2)
It's easier and safer to leak documents from western democracies. And there's also the issue of news. The US or a European country does something bad, it's news. Russia, China, and Iran do something bad... well, what did you expect
Re: (Score:2)
Re: (Score:3, Insightful)
Wikileaks doesn't harm western democracies - they do inconvenience the administrations, but the whole concept of leaks are great for the society, citizens, and especially the democracy part; silencing leaks would harm western democracy and destroy the whole meaning of it. I don't care about Chinese government cheating their citizens - that's their problem, I want to be informed about the failures and lies of *my* officials that I elected and that affect my country. I don't want to improve country reputation
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Depends on what you mean by controversial. They did take down the Church that was going to burn the Koran site which I have at best mixed feelings over.
Rackspace does have strict polices on hate speech, child porn, and wares.
I have no problem with that at all.
I do not know how they would feel about Cryptome. I would not put that site in any of those categories.
I do know that they have good service and support.
Not hacked! (Score:3, Insightful)
The controversy about hacker vs. cracker is old and unsolved. But this case really does not warrant the use of the word "hack/hacked" under any meaning of the word whatsoever. This is a act of pure vandalism, nothing more.
Re: (Score:2)
Cryptome reported that it's EarthLink e-mail account was compromised in ways unknown
Sounds like hacking to me. The rest was exploiting the trust all providers build around your email being secure. All to pursue the end of simple vandalism.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2, Troll)
vandalism, nothing more? (Score:2)
Its not as difficult as many might think to breach the security of a large ISP. Ask any Red Team. The IT personnel working there is probably mired by the tribulations of just trying to keep up with the little stuff, and haven't the time to build security in. Having a security 'plan' has little effect if your forward facing defence bo
Re: (Score:2)
Oh, really? See The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (by Clifford Stoll) [amazon.com].
Re: (Score:3, Interesting)
If you can't afford such writers, mount /var/log (or /var/adm depending on your system) on a remote with a different authentication with the directories as 500(-r-x------) and files as 300(--wx------) with a specific user for whichever syslog variant you use. Then chattr -i on the remote system so that the directory is immutable. On the remote system
Re: (Score:2)
Maybe the word "sacked"?
Hack (Score:5, Insightful)
Is a social engineering attack a hack? It sounds like someone called over to EarthLink and got an e-mail password reset. Then, once holding the e-mail account, called over to Network Solutions. This sort of thing wouldn't be difficult at all.
Re:Hack (Score:5, Interesting)
Re: (Score:3, Insightful)
Is a social engineering attack a hack? It sounds like someone called over to EarthLink and got an e-mail password reset. Then, once holding the e-mail account, called over to Network Solutions. This sort of thing wouldn't be difficult at all.
FYI - 'Hacking' never is, never has been, and likely never will be. The kind of amazing tricks you're imagining under that term lie within the realm of security research, espionage, etc. 'Hackers' are, by definition, hobbyists, and hobbyists are generally doing it for the love of the game, for the fun of it, etc. The guys doing the stuff that might actually amaze you are being PAID to do so. Otherwise they'd give it up and move on to something easier, until such time as nothing easier actually exists.
Re: (Score:3)
In short, the movie 'Hackers' bears zero resemblance on reality.
Huh?
The bulk of the leadup to a hack involved sifting through logs, dumpster diving, and social engineering (like the eidetic memory delivery guy or asking A/H guy what the phone number was on the label).
The fancy graphics and the ZOMG! 486! were all Hollywood, but there were some moments the scriptwriters didn't screw up beyond recognition.
Besides, I still own my 'Man in a pink shirt' book ^_^
Re: (Score:2)
That movie is a great metaphor for the hacking scene in the 90's--a metaphor for how you might have seen it from your computer. Sure, the roller blades and VR goggles might be cheesy, but it really captures the essence of the scene, kids vs. the corporate hackers, money vs. punk liberalism. Still brings a smile to my face 10 years later.
Ownership (Score:2)
Re: (Score:2)
http://www.macminicolo.net/facility.html
Send in x number of Mac Minis and load them with OpenBSD, Linux ect.
Re: (Score:2)
That's called colocation, and it doesn't mean shit.
Joe random tech can yank your drive, boot with an external kernel with init=/bin/sh or whatever, do nefarious things, put it all back up, and claim a power outage or whatever.
Unless it's sitting in your facility or your access control (locked cage with no raised floor, you have only keys) then it isn't secured.
Unless you use full disk encryption, in which case driving in to boot your servers will get old. IPKVMs or other workarounds = keylogger = pointless.
Professional vs. Amateur Hour (Score:5, Insightful)
A professional organization that knows its web presence is its life is going to have a bit better setup than a server that someone else (Network Solutions in this case) has control over. The right solution is a co-located server that is controlled exclusively by the organization. The hosting company doesn't need to have any passwords. They are also going to have their email processed by their own server and not be relying on an ISP for anything at all except connectivity.
However, a completely amateur operation is going to use shared virtual hosting because it is cheaper and the hosting company will be doing backups for them. And controlling passwords. And all other security. Oh, and using a non-domain based email setup from an ISP.
I guess it is pretty obvious into which category Cryptome falls, right?
Yes, it would cost $2000 a year or more for a co-located server whereas shared virtual hosting is dirt cheap.
Re:Professional vs. Amateur Hour (Score:5, Insightful)
Being a non-profit organizatino, Cryptome's status as a professional organization or an amateur organization probably depends on the size of their donation base. For a website group trying to get by on a shoestring budget... well, maybe this little stunt will help them raise awareness to get the donations for a better server setup. (Not that I actually know the size of their donation base, and maybe they do have enough money for that sort of setup and they're just stingy/stupid.)
Re: (Score:3, Interesting)
Using virtual hosting might be intentional. A lot of people don't particularly like them. Including agencies of the US government. By running their site on a shared box with hundreds (thousands?) of others, they're a little more protected against the infamous "just take the whole server" attack. Also, it gives them more money to allocate to bandwidth costs, which as I understand it are pretty high.
Re: (Score:2)
Re: (Score:2)
I said "a little more protected", not invulnerable. If it makes them think twice or is enough for a judge to hold up a warrant or, heck, it's enough to generate some publicity over it, then it's better than nothing.
More likely, Young just doesn't give a shit. The kinds of people he's afraid of are just going to sniff his passwords from his brain through a weak point in his tinfoil hat, so why pay extra for security or reliability.
Re: (Score:2)
Or in between. We have our servers managed by our hosting company. We don't have root control, but they maintain the PCI compliance and honestly we've not had a problem in years that wasn't solved in less than 10 minutes via phone. We have RAID 5, they do back ups, but we have back ups of the db and critical files done nightly and SFTPed to a box back at the office, which is then backed up to tape once a week and every monday morning that tape is taken to a safe deposit box at our bank. Every month we pu
Re: (Score:2)
``we've not had a problem in years that wasn't solved in less than 10 minutes via phone''
Sounds like eagerness to solve problems via phone was one of the things that burned Cryptome here.
Old school (Score:5, Informative)
Cryptome was cool before Wikileaks made it mainstream. And John Young is the original gangsta, so you know he got backups. Bitches don't know about all the backups he has.
Re: (Score:2)
best post ever.
Re: (Score:2)
EarthLink? They're still alive? (Score:2)
I once had an account with them, back in the 33k days. Also Erols. I guess these old services never truly die..... they just fade away.
Wired Reporter to be Subpoenaed (Score:4, Interesting)
And Cryptome is now saying that a Wired reporter contacted them [cryptome.org] after having spoken with a hacker claiming responsibility for the attack.
Which they responded to with a threat of a subpoena, and publishing news about it before the reporter, after they told the reporter they wouldn't? ... er. Way to burn bridges, guys? Seriously, I understand free speech and using reporters as sources, but I don't think reporters are going to be too gung-ho about reporting your findings later after this.
Re:Wired Reporter to be Subpoenaed (Score:5, Interesting)
AND I'd try to get that subpoena too. The First Amendment guarantees freedom of the press, but it doesn't guarantee freedom from subpoena. An ethical journalist would go to jail in contempt of court before giving up a confidential source, but since journalism has abandoned most of the principles of old, I wouldn't count on that happening.
and so you will chase away the information source (Score:2)
and the crime against you will go unpunished
i'm not saying that you have no right to seek out the information source about the crime against you, i'm saying your tactics suck
what you do is you let the information source speak, and you ask the reporter for more information. you make up false reasons for why the information source is wrong, forcing the information source to prove they actually are genuine. or you keep them talking, until they make a mistake, and they reveal themselves
you set a fire, and you s
Re: (Score:2)
This is Wired, who had no qualms ratting out the Wikileak's army informant.
I'll be surprised if they haven't already finked on this guy too, unless it was one of their own or t
Re: (Score:2)
Re: (Score:2)
Cryptome.org's SOP is to report on all interviews, he's been doing that for ages now.
From the interview, even the Wired clueless bimbo was aware of this.
Knowing the SOP before you call a site about them being defaced, and still asking for exceptions while you hide the perpetrators of the defacement doesn't come across as building bridges to me.
Wired? Figures. (Score:2)
Who would have guessed? This isn't a surprise at all.
SSH FTW (Score:3, Interesting)
Its the only CMS I use on my servers. Mercurial for version control over ssh. Update my sites with hg push. Hooks on the receiving side to run hg up and rebuild if required. SSH can be configured to require certificates only for authentication. Desktop environments all integration with ssh-askpass or similar.
Colo vs Home Server vs Virtual Machine, and backup (Score:2)
Well, it just goes to show you get what you pay for. From the point of view of security Colo is probably the best, but running a server on a static IP from home is likely the most cost effective. Virtual hosting is dirt cheap but worthless for any serious operation. VMs tend to be configured minimally and ISPs mash them all together using shared resources so performance is all over the place. It's pretty easy to brick an OS running in a VM due to the minimal memory configuration it is typically given.
An
Re:Colo vs Home Server vs Virtual Machine, and bac (Score:4, Insightful)
Also... only 8G of data? That's it?
how much data do you expect them to host? it's not like they store multi GB long videos of events or anything.
Re: (Score:2)
Also... only 8G of data? That's it?
I have to appreciate that 20 years ago the same amount of data would have elicited a response more like "8G of data? What on earth are they storing that would require that much?!?"
Re: (Score:2)
Well, it just goes to show you get what you pay for.
Are you in marketing by chance? "You get what you pay for" is what somebody trying to sell crappy products at a quality price says. The fact is, you DON'T always get whet you pay for, although you usually pay for what you get.
Any time someone tells me "you get what you pay for" I hold on to my wallet extra tightly.
EarthLink? (Score:2)
Why not use Hotmail while you're at it.
John Young is alleged to be paranoid as hell; no idea how something like this can happen.
Encyclopedia Dramatica? (Score:2)
Re: (Score:2, Insightful)
Didn't they tell you to use both uppercase and lowercase letters? Had you used "Passw0rd" instead, nobody would have found out!
Re: (Score:2)
No, you need uppercase, lowercase, numbers, and punctuation. "Pass-w0rd" is unbreakable!